OS Command Injection in '/lib/un.rb -- Utilities to replace common UNIX commands in Makefiles etc'

Disclosed: 2021-07-19 09:54:30 By sighook To ruby
Medium
Vulnerability Details
If the `wait_writable` command receives a list of files with a command in the name of one of them, it will be executed. # PoC ```bash $ touch \|\ touch\ evil.txt $ ls '| touch evil.txt' $ ruby -run -e wait_writable -- -w 1 -v * $ ls evil.txt '| touch evil.txt' ``` The vulnerability has the same severity as https://hackerone.com/reports/651518 . The fix, respectively, is the same: `open` -> `File.open`. ## Impact An attacker can use this problem to execute arbitrary commands in environments that uses ruby coreutilities.
Actions
View on HackerOne
Report Stats
  • Report ID: 1158824
  • State: Closed
  • Substate: informative
  • Upvotes: 4
Share this report